crypto digitalsignature

35
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature

Upload: fraspi

Post on 19-Jul-2016

32 views

Category:

Documents


1 download

DESCRIPTION

Crypto DigitalSignature

TRANSCRIPT

Page 1: Crypto DigitalSignature

13.1

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 13Digital Signature

Page 2: Crypto DigitalSignature

13.2

Objectives

To define a digital signature

To define security services provided by a digital signature

To define attacks on digital signatures

To discuss some digital signature schemes, including RSA, ElGamal,

Schnorr, DSS, and elliptic curve

To describe some applications of digital signatures

Chapter 13

Page 3: Crypto DigitalSignature

13.3

13-1 13-1 COMPARISON

Let us begin by looking at the differences between Let us begin by looking at the differences between conventional signatures and digital signatures.conventional signatures and digital signatures.

13.1.1 Inclusion13.1.2 Verification Method 39013.1.3 Relationship13.1.4 Duplicity

Topics discussed in this section:Topics discussed in this section:

Page 4: Crypto DigitalSignature

13.4

A conventional signature is included in the document; it is part of the document. But when we sign a document digitally, we send the signature as a separate document.

13.1.1 Inclusion

Page 5: Crypto DigitalSignature

13.5

For a conventional signature, when the recipient receives a document, she compares the signature on the document with the signature on file. For a digital signature, the recipient receives the message and the signature. The recipient needs to apply a verification technique to the combination of the message and the signature to verify the authenticity.

13.1.2 Verification Method

Page 6: Crypto DigitalSignature

13.6

For a conventional signature, there is normally a one-to-many relationship between a signature and documents. For a digital signature, there is a one-to-one relationship between a signature and a message.

13.1.3 Relationship

Page 7: Crypto DigitalSignature

13.7

In conventional signature, a copy of the signed document can be distinguished from the original one on file. In digital signature, there is no such distinction unless there is a factor of time on the document.

13.1.4 Duplicity

Page 8: Crypto DigitalSignature

13.8

13-2 13-2 PROCESS

Figure 13.1 shows the digital signature process. The Figure 13.1 shows the digital signature process. The sender uses a signing algorithm to sign the message. sender uses a signing algorithm to sign the message. The message and the signature are sent to the receiver. The message and the signature are sent to the receiver. The receiver receives the message and the signature The receiver receives the message and the signature and applies the verifying algorithm to the and applies the verifying algorithm to the combination. If the result is true, the message is combination. If the result is true, the message is accepted; otherwise, it is rejected.accepted; otherwise, it is rejected.

13.2.1 Need for Keys13.2.2 Signing the Digest

Topics discussed in this section:Topics discussed in this section:

Page 9: Crypto DigitalSignature

13.9

13-2 13-2 Continued

Figure 13.1 Digital signature process

Page 10: Crypto DigitalSignature

13.10

13.2.1 Need for Keys

Figure 13.2 Adding key to the digital signature process

A digital signature needs a public-key system.The signer signs with her private key; the verifier

verifies with the signer’s public key.

Note

Page 11: Crypto DigitalSignature

13.11

13.2.1 Continued

A cryptosystem uses the private and public keys of the receiver: a digital signature uses

the private and public keys of the sender.

Note

Page 12: Crypto DigitalSignature

13.12

13.2.2 Signing the Digest

Figure 13.3 Signing the digest

Page 13: Crypto DigitalSignature

13.13

13-3 13-3 SERVICES

We discussed several security services in Chapter 1 We discussed several security services in Chapter 1 including message confidentiality, including message confidentiality, message message authenticationauthentication, message integrity, and , message integrity, and nonrepudiationnonrepudiation. . A digital signature can directly provide the last three; A digital signature can directly provide the last three; for message confidentiality we still need for message confidentiality we still need encryption/decryption.encryption/decryption.

13.3.1 Message Authentication13.3.2 Message Integrity13.3.3 Nonrepudiation13.3.4 Confidentiality

Topics discussed in this section:Topics discussed in this section:

Page 14: Crypto DigitalSignature

13.14

A secure digital signature scheme, like a secure conventional signature can provide message authentication.

13.3.1 Message Authentication

A digital signature provides message authentication.

Note

Page 15: Crypto DigitalSignature

13.15

The integrity of the message is preserved even if we sign the whole message because we cannot get the same signature if the message is changed.

13.3.2 Message Integrity

A digital signature provides message integrity.

Note

Page 16: Crypto DigitalSignature

13.16

13.3.3 Nonrepudiation

Figure 13.4 Using a trusted center for nonrepudiation

Nonrepudiation can be provided using a trusted party.

Note

Page 17: Crypto DigitalSignature

13.17

13.3.4 Confidentiality

A digital signature does not provide privacy.If there is a need for privacy, another layer of

encryption/decryption must be applied.

Figure 13.5 Adding confidentiality to a digital signature scheme

Note

Page 18: Crypto DigitalSignature

13.18

13-4 13-4 ATTACKS ON DIGITAL SIGNATURE

This section describes some attacks on digital This section describes some attacks on digital signatures and defines the types of forgery.signatures and defines the types of forgery.

13.4.1 Attack Types13.4.2 Forgery Types

Topics discussed in this section:Topics discussed in this section:

Page 19: Crypto DigitalSignature

13.19

13.4.1 Attack Types

Key-Only Attack

Known-Message Attack

Chosen-Message Attackthe attacker first learns signatures on arbitrary messages of the attacker's choice.

the attacker is given valid signatures for a variety of messages known by the attacker but not chosen by the attacker.

the attacker is only given the public verification key.

Page 20: Crypto DigitalSignature

13.20

13.4.2 Forgery Types

Existential Forgery

Selective Forgery

Existential forgery is the creation (by an adversary) of any message/signature pair (m,σ), where σ was not produced by the legitimate signer.

Selective forgery is the creation (by an adversary) of a message/signature pair (m,σ) where m has been chosen by the adversary prior to the attack.

Page 21: Crypto DigitalSignature

13.21

13-5 13-5 DIGITAL SIGNATURE SCHEMES

Several digital signature schemes have evolved during Several digital signature schemes have evolved during the last few decades. Some of them have been the last few decades. Some of them have been implemented. implemented.

13.5.1 RSA Digital Signature Scheme13.5.2 ElGamal Digital Signature Scheme13.5.3 Schnorr Digital Signature Scheme13.5.4 Digital Signature Standard (DSS)13.5.5 Elliptic Curve Digital Signature Scheme

Topics discussed in this section:Topics discussed in this section:

Page 22: Crypto DigitalSignature

13.22

Key GenerationKey generation in the RSA digital signature scheme is exactly the same as key generation in the RSA

13.5.1 Continued

In the RSA digital signature scheme, d is private; e and n are public.

Note

Page 23: Crypto DigitalSignature

13.23

Signing and Verifying

13.5.1 Continued

Figure 13.7 RSA digital signature scheme

Page 24: Crypto DigitalSignature

13.24

13.5.1 Continued

As a trivial example, suppose that Alice chooses p = 823 and q = 953, and calculates n = 784319. The value of (n) is 782544. Now she chooses e = 313 and calculates d = 160009. At this point key generation is complete. Now imagine that Alice wants to send a message with the value of M = 19070 to Bob. She uses her private exponent, 160009, to sign the message:

Example 13.1

Alice sends the message and the signature to Bob. Bob receives the message and the signature. He calculates

Bob accepts the message because he has verified Alice’s signature.

Page 25: Crypto DigitalSignature

13.25

RSA Signature on the Message Digest

13.5.1 Continued

Figure 13.8 The RSA signature on the message digest

Page 26: Crypto DigitalSignature

13.26

13.5.1 Continued

When the digest is signed instead of the message itself, the susceptibility of the RSA digital signature

scheme depends on the strength of the hash algorithm.

Note

Page 27: Crypto DigitalSignature

13.27

13.5.2 ElGamal Digital Signature Scheme

Figure 13.9 General idea behind the ElGamal digital signature scheme

Page 28: Crypto DigitalSignature

13.28

Key GenerationThe key generation procedure here is exactly the same as the one used in the cryptosystem.

13.5.2 Continued

In ElGamal digital signature scheme, (e1, e2, p) is Alice’s public key; d is her private key.

Note

Page 29: Crypto DigitalSignature

13.29

Verifying and Signing

13.5.2 Continued

Figure 13.10 ElGamal digital signature scheme

Page 30: Crypto DigitalSignature

13.30

13.5.3 Schnorr Digital Signature Scheme

Figure 13.11 General idea behind the Schnorr digital signature scheme

Page 31: Crypto DigitalSignature

13.31

13.5.4 Digital Signature Standard (DSS)

Figure 13.13 General idea behind DSS scheme

Page 32: Crypto DigitalSignature

13.32

DSS Versus RSAComputation of DSS signatures is faster than computation of RSA signatures when using the same p.

DSS Versus ElGamalDSS signatures are smaller than ElGamal signatures because q is smaller than p.

13.5.4 Continued

Page 33: Crypto DigitalSignature

13.33

13.5.5 Elliptic Curve Digital Signature Scheme

Figure 13.15 General idea behind the ECDSS scheme

Page 34: Crypto DigitalSignature

13.34

13-6 13-6 VARIATIONS AND APPLICATIONS

This section briefly discusses variations and This section briefly discusses variations and applications for digital signatures.applications for digital signatures.

13.6.1 Variations13.6.2 Applications

Topics discussed in this section:Topics discussed in this section:

Page 35: Crypto DigitalSignature

13.35

13.6.1 Variations

Time Stamped SignaturesSometimes a signed document needs to be time stamped to prevent it from being replayed by an adversary. This is called time-stamped digital signature scheme.

Blind SignaturesSometimes we have a document that we want to get signed without revealing the contents of the document to the signer.